{"content_customizations":null,"shortcut_customizations":[{"id":3510,"created_at":"2022-11-09T13:23:25.595978Z","updated_at":"2022-11-09T13:23:25.604104Z","action":"DOWNLOAD","color":"#FFFFFF","icon_url":"https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/35ee1c336c71499bad0f609be644ca37/download_icon.svg","additional_data":{"download_url":"https://media.celero.io/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/original_file.pdf"},"content":4214}],"content_thumbnail":{"original":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails/1.jpg","high_quality":{"small":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1.jpg","medium":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_medium.jpg","large":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/1_large.jpg","microsite_preview":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7/thumbnails_high_quality/preview.jpg"}},"version":{"version_number":1,"version_details":{"uuid":"f62592e0-8f78-46e2-887c-2f52716be127","name":" Cognyte_TL_3_Key_Trends_WP_EN","is_live":true,"access_control":{"min_stage":"EVERYONE_ALLOWED","stage_options":{"UNVERIFIED_CONTACT":{"form_preview":"LANDING_PAGE","form_id":"default"},"VERIFIED_CONTACT":{"form_preview":"LANDING_PAGE"},"GDPR_CONSENT":{},"PRIVATE":{},"EVERYONE_ALLOWED":{}}},"base_shorten":"28eb9f77","tags":[]},"is_active":true,"type":"DESKTOP","version":"f62592e0-8f78-46e2-887c-2f52716be127","content_uuid":"f62592e0-8f78-46e2-887c-2f52716be127","version_id":"f62592e0-8f78-46e2-887c-2f52716be127"},"custom_events":[],"content_action":null,"content_stats":null,"content_meta_tags":{"url_title":"security-trends-whitepaper-2022","title":"3 Key Trends in 2022","description":"INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ","og_enabled":true,"seo_enabled":false,"version":"f62592e0-8f78-46e2-887c-2f52716be127"},"keywords":[],"seo_content_version_name":"-cognyte-tl-3-key-trends-wp-en","html_snippets":null,"is_live":true,"shorten":"https://engage.cognyte.com/s/28eb9f77/","base_url":"/users/557/content/0bdfb83148b04693b866316cf9d6d2d9/_4P8YdG7","config":{"pagecount":14,"bounds":[[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286],[909,1286]]},"annotations":{"pages":[{"page":14,"annotations":[{"type":"TextLink","bounds":[69,596,365,12],"action":{"type":"URI","uri":"https://www.europol.europa.eu/socta/2017/drivers-of-crime.html"}},{"type":"TextLink","bounds":[72,622,465,12],"action":{"type":"URI","uri":"https://go.chainalysis.com/rs/503-FAP-074/images/2020-Crypto-Crime-Report.pdf"}},{"type":"TextLink","bounds":[72,648,610,12],"action":{"type":"URI","uri":"https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot"}},{"type":"TextLink","bounds":[72,674,465,12],"action":{"type":"URI","uri":"https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420"}},{"type":"TextLink","bounds":[72,700,500,12],"action":{"type":"URI","uri":"https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis"}},{"type":"TextLink","bounds":[72,778,292,12],"action":{"type":"URI","uri":"https://www.seagate.com/our-story/data-age-2025/"}},{"type":"TextLink","bounds":[72,804,341,12],"action":{"type":"URI","uri":"https://www.idc.com/getdoc.jsp?containerId=prUS46286020"}},{"type":"TextLink","bounds":[77,830,651,12],"action":{"type":"URI","uri":"https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because"}},{"type":"TextLink","bounds":[74,874,231,12],"action":{"type":"URI","uri":"https://fas.org/sgp/crs/natsec/R45178.pdf"}},{"type":"TextLink","bounds":[77,900,483,12],"action":{"type":"URI","uri":"https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence"}},{"type":"TextLink","bounds":[77,926,651,12],"action":{"type":"URI","uri":"https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network"}},{"type":"TextLink","bounds":[77,952,610,12],"action":{"type":"URI","uri":"https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age"}},{"type":"Link","bounds":[70,594,362,17],"objref":"42","action":{"type":"URI","uri":"https://www.europol.europa.eu/socta/2017/drivers-of-crime.htm"}},{"type":"Link","bounds":[72,646,610,17],"objref":"43","action":{"type":"URI","uri":"https://www.researchgate.net/publication/227273142_Devious_Chatbots_-_Interactive_Malware_with_a_Plot"}},{"type":"Link","bounds":[74,672,466,17],"objref":"44","action":{"type":"URI","uri":"https://www.fbi.gov/news/testimony/worldwide-threats-to-the-homeland-092420"}},{"type":"Link","bounds":[74,698,500,17],"objref":"45","action":{"type":"URI","uri":"https://info.claroty.com/the-critical-convergence-of-it-and-ot-security-in-a-global-crisis"}},{"type":"Link","bounds":[74,776,297,17],"objref":"46","action":{"type":"URI","uri":"https://www.seagate.com/our-story/data-age-2025/ "}},{"type":"Link","bounds":[74,802,345,17],"objref":"47","action":{"type":"URI","uri":"https://www.idc.com/getdoc.jsp?containerId=prUS46286020 "}},{"type":"Link","bounds":[78,828,656,17],"objref":"48","action":{"type":"URI","uri":"https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/"}},{"type":"Link","bounds":[77,847,147,17],"objref":"49","action":{"type":"URI","uri":"https://www.tampabay.com/news/military/macdill/SOCom-leader-wanted-to-toss-Google-exec-from-car-Because he-was-right-_167629195/"}},{"type":"Link","bounds":[75,873,232,17],"objref":"50","action":{"type":"URI","uri":"https://fas.org/sgp/crs/natsec/R45178.pdf"}},{"type":"Link","bounds":[77,899,484,17],"objref":"51","action":{"type":"URI","uri":"https://fedtechmagazine.com/article/2018/12/cia-cio-sees-data-tip-spear-intelligence"}},{"type":"Link","bounds":[77,924,657,17],"objref":"52","action":{"type":"URI","uri":"https://www.theguardian.com/world/2020/nov/04/police-investigate-if-vienna-attacker-was-part-of-wider-network "}},{"type":"Link","bounds":[77,950,611,17],"objref":"53","action":{"type":"URI","uri":"https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1566262/intelligence-in-a-data-driven-age"}},{"type":"Link","bounds":[55,370,122,41],"objref":"54","action":{"type":"URI","uri":"https://www.cognyte.com/"}},{"type":"Link","bounds":[54,362,130,55],"objref":"55","action":{"type":"URI","uri":"https://www.cognyte.com/contact/"}}]}]},"created_at":"2022-11-09T13:23:25.343124Z","updated_at":"2026-04-17T04:58:38.729785Z","original_name":"Security_trends_whitepaper_2022_with_Vienna.pdf","uuid":"f62592e0-8f78-46e2-887c-2f52716be127","description":"INVESTIGATIVE ANALYTICS DRIVING THE NEED FOR 3 KEY TRENDS IN 2022 ","is_high_quality_thumbnails_available":true,"conversion_type":"DOCUMENT"}